FREE TO VIEW


« Back to News

2022-05-24

Clearview Pays £7.5m For Illegally Storing Facial Images

Facial recognition company Clearview AI has been fined £7.5m by the British regulator and told to delete the data of British residents that it holds.

2022-05-23

European Union Agrees New Cyber Security Legislation

NIS 2: The EU has reached agreement on new legislation to impose common cyber security standards on critical EU industry sectors.

2022-05-23

CISA Detect Vulnerabilities In VMWare Products

Random Disconnection: CISA says unpatched VMWare devices should be considered to be compromised and need to be urgently checked.

2022-05-23

Canada Bans China From Its 5G Networks

Canada's telecoms operators are no longer allowed to use Huawei & ZTE gear. Those that have already installed their equipment must remove it. 

2022-05-23

Personal Data Of Two Million Texans Left Exposed For Years

Social Security numbers, addresses, dates of birth, phone numbers and other personal information exposed to anyone who knew how to find it.

2022-05-19

Conti Attack US Precision Engineering Business

A leading maker of aerospace systems has confirmed that it was hit by hackers, who then exposed employees’ personally identifiable information. 

2022-05-19

Never Trust Anything Again - The Zero Trust World

Organisations must abandon the ‘trust everything, but verify’ approach. Never trust. Always verify. Continuously monitor. By Colin Tankard

2022-05-17

Elon Musk's Deal To Buy Twitter Comes To A Standstill

Twitter is having problems calculating just how many fake accounts are on their platform and it could be Elon Musk wants to renegotiate the terms.

2022-05-23

Why Data Storage Is the Number One Cyber Recovery Strategy

Avert the worst consequences of cyber crime: Create multiple backups of your files, keeping your business safe from major data disasters.

2022-05-18

Google’s New Security Features

Google is giving users much more control over personal privacy and the adverts they are served, as well as better security for online payments.

2022-05-17

British Cyber Security At Risk From Russia

Britain's security Minister and his spy agency chiefs agree that the cyber war in Ukraine is spreading and a nationwide response is needed.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Securonix

Securonix

Securonix delivers a next generation security analytics and operations management platform for the modern era of big data and advanced cyber threats.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.